|
Anomaly Detection Through Massive Event Correlation in ICT Networks
|
Written by aismail |
Hits: 4153
|
|
Silent Installs - Studying the Dark Side of the Pay-Per-Install Business
|
Written by aismail |
Hits: 4023
|
|
Detecting Illicit content in picture streams
|
Written by aismail |
Hits: 6651
|
|
iHoneyClient - discovery and analysis of malware for Mac OS X
|
Written by aismail |
Hits: 4943
|
|
Automated extraction of economic information from underground marketplaces using machine learning
|
Written by aismail |
Hits: 3983
|
|
Information leakage detection and prevention on Android devices
|
Written by aismail |
Hits: 5452
|
|
Extracting economic information from underground marketplaces
|
Written by aismail |
Hits: 4349
|
|
Security Analysis of Metropolitan Locking Systems Using the Example of the City of Vienna
|
Written by aismail |
Hits: 4260
|
|
Intrusion Detection for Power Utility Automation Networks
|
Written by aismail |
Hits: 4669
|
|
Location Based Keys, Implementation of an encryption scheme
|
Written by aismail |
Hits: 3916
|